Skip to content

Commit 0006499

Browse files
[IT-4071] Suppress HTTP findings for Bridge buckets (#1335)
Suppress CIS 2.1.2 for S3 buckets in Bridge because the application accesses consent form templates in S3 via HTTP.
1 parent fc24748 commit 0006499

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed

org-formation/075-security-hub/security-hub-suppress-infra.yaml

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -354,6 +354,8 @@ Resources:
354354
# Below this point, rules are defined to send findings to the SecurityHubFindingsQueue above
355355
# The findings on the queue will be processed by a lambda that will suppress them in SecurityHub
356356

357+
# Event format: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cwe-event-formats.html
358+
357359
# This rule suppresses findings for the given controls (GeneratorId) in all the accounts
358360
SuppressFindingsInAllAccountsRule:
359361
Type: AWS::Events::Rule
@@ -496,3 +498,34 @@ Resources:
496498
- SecurityHubFindingsQueue
497499
- Arn
498500
Id: Target0
501+
502+
# Suppress all findings for insecure access to S3 buckets in the bridge accounts
503+
# because consent forms are accessed via HTTP
504+
SuppressFindingsForBridgeAccounts:
505+
Type: AWS::Events::Rule
506+
Properties:
507+
Description: SecHubSuppress findings for HTTP access in Bridge
508+
EventPattern:
509+
detail:
510+
findings:
511+
GeneratorId:
512+
# Ensure S3 Bucket Policy is set to deny HTTP requests
513+
- 'cis-aws-foundations-benchmark/v/1.4.0/2.1.2'
514+
Workflow:
515+
Status:
516+
- NEW
517+
- NOTIFIED
518+
account:
519+
- '420786776710' # bridge-dev
520+
- '649232250620' # bridge-prod
521+
detail-type:
522+
- Security Hub Findings - Imported
523+
source:
524+
- aws.securityhub
525+
State: ENABLED
526+
Targets:
527+
- Arn:
528+
Fn::GetAtt:
529+
- SecurityHubFindingsQueue
530+
- Arn
531+
Id: Target0

0 commit comments

Comments
 (0)